Chapter System Analysis and Design. 5.1 Introduction

Size: px
Start display at page:

Download "Chapter System Analysis and Design. 5.1 Introduction"

Transcription

1 Chapter 5 5. System Analysis and Design 5.1 Introduction Using of correct and clear System Analysis and Design methodology helps to close the communication gaps between business people and IS developers, as well as between developers and developers. This not only helps us ensure the system is built right but also that the right system is built for the business. In this chapter, all the information that needs to understand the current system has been discussed. This chapter gives a clear picture of what actually the physical system is? Identification the scope of the system, identification of user s requirement, recommendations to overcome the limitations and problems of the present system and the feasibility of the proposed Business Solution Options (BSOs) are the main focused areas of this chapter. In addition to that the architectural design of the proposed system and in detail specifications of the proposed system also have been discussed including context diagrams, DFDs, LDS, Relation ship diagram etc of the proposed system. In the analysis phase below questions were answered - Who will use the system? - What the system will do? - Where and when will it be used? In the design phase it was decided how the system will operate, in terms of the hardware, software, and network infrastructure; the user interface, forms, and reports that will be used; and the specific programs, databases, and files that will be needed. 42

2 5.2 System Investigation. Structured System Analysis and Designing Methodologies (SSADM) is used as the system analysis and designing methodology Requirement Gathering. Interviewing is a common technique used to collect information from key stakeholders in a software project. Since this method is having following advantages it same was used for requirement gathering Generally easy, because it can be done with minimal preparation. Interviews of individuals and small groups require less planning and scheduling effort than large workshops. Interviews of individuals and small groups require less stakeholder commitment than large workshops. Interviews provide an opportunity to explore or clarify topics in more detail. Initially, few meetings had with production manager and collected all the necessary information about the requirement. All the formulas and methodology for calculation of productivity was given by him. After identifying his requirement, then separate set of meetings had with the managers of other relevant departments. Their requirements also were identified. All the information with the copies of existing report and documents also were collected. Based on the collected data and information, functional and non-functional requirement were identified Functional and Non Functional Requirements Functional Requirements Functional requirements explain what the system should do, and identify the necessary task, action or activity that must be accomplished. Identified functional requirements are listed below and the system must provide theses facilities: System shall provide facility to calculate the productivity ratio line wise weekly basis. 43

3 System shall provide facility to calculate the average productivity ratio line wise for a given week range (Monthly). System shall provide facility to input adjustment parameter line wise to adjust the productivity value if necessary. System shall provide facility to input the setup factor parameter line wise to adjust the productivity value if necessary. Standard timing data for transformers should be able to add/modify/print. Best operation should be able to mark and should be able to identify separately in the timing sheet. Standard timing sheet of a transformer should be able to copy for another transformer Standard timing sheet of a transformer should be able to copy for as for a job timing sheet. Facility should be available to copy standard timing sheet for a given job range at once as a bulk. Option should be available to filter based on job start date too System shall provide facility to add/modify job operations o New operations should be able to add for the job timing sheet o Timing of job operations should be able to change o Job operations should be able to remove if there is no any transactions for that operation The system shall provide facility to assign different machines to different production lines. System shall provide facility to add/modify weekly labour hours week wise System shall provide facility to query daily transaction data on Job wise. System shall provide facility to generate validation reports for completed quantities operations based on operation order. System should validate the production quantity at the time of entering the data with the job quantity based on the line setup parameters. System should automatically picks up the correct operation timing for the operation based on the available timing and the predefined priority criteria. System should have the facility to graphically analyse trends of the productivity variations of lines. 44

4 Non Functional Requirements A non-functional requirement is a statement of how a system must behave; it is a constraint upon the systems behaviour. The quality of an application depends on more than how well it satisfies user-functional requirements. Even an application that successfully makes it through development and deployment can encounter grumblings from users., if it is hard to use, keeps failing, is difficult to diagnose, or consumes excessive resources. In addition to user-functional requirements, you must also consider how well the application satisfies the non-functional requirements and fits into the organization's operational environment Identified Non-functional requirement are listed below. Daily production output data sheets should be sent to data entry operators on time. Database server should be kept on active always. Database server should be capable enough to handle huge data volume Uninterrupted power system should be available to supply power for the servers. A reliable networking facility should be available as many users work in the system simultaneously online. 6 to 10 data entry operators should be available for huge data entering. Proper procedure has to be implemented in order to collect the data sheets from production lines HR department should provide line wise working hours weekly on time Software Requirement Specification for the Proposed System After identifying all the functional and non-functional requirements, a feasibility study was done and documented. Then Software Requirement Specification (SRS) was prepared. SRS document was distributed to all the stakeholders for the acceptance. Then some additional requirements were proposed by some stakeholders. Another meeting had with all the stakeholders and acceptance was received form all the users and finalized the SRS. 45

5 5.3 Business Activity Model of the Existing System The objective of Business Activity Modelling is to find the relevant business activities in order to isolate the ones that depend on an interchange of information in the form of data items. Having isolated the subset of data dependent activities, it is easy to see the shape of the potential computer information system. Business Activity Modelling plays an important part in our communication with users because it uses their own language to help them see which business activities will remain unaffected by the future computerised information system. Figure 5.1 shows the Business Activity model of the system which was used to identify activities and to define the system boundary. 46

6 Figure 5.1 : Business Activity Model of the Existing System 47

7 5.4 Data Flow Diagrams A data flow diagram (DFD) is a graphical representation of the "flow" of data through an information system. With a dataflow diagram, users are able to visualize how the system will operate, what the system will accomplish, and how the system will be implemented. Dataflow diagrams were used to provide the end user with a physical idea of where the data they input ultimately has an effect upon the structure of the whole system. These DFDs helped to explain to users how the system is developed. The old system's dataflow diagrams was drawn up and compared with the new system's dataflow diagrams to draw comparisons to implement a more efficient system Context Diagram of the Existing System System Context Diagrams are diagrams which are used in systems design to represent all external entities that may interact with a system. This diagram is the highest level view of a system and shows the system at the center, with no details of its interior structure, surrounding by all its interacting systems, environment and activities with its inputs and outputs from/to external factors/entities. The objective of a system context diagram is to focus attention on external factors and events that should be considered in developing a complete set of system requirements and constraints. Figure 5.2 shows existing system as a whole with all the external entities and their interactions and its inputs and outputs. This was used early in a project to get agreement on the scope under investigation. 48

8 E & CR Dept Material BOM Order Master Data Emplo yee Master Data Data Entry Operator Employee Monthly evaluation Data Sheet Employee Semi Annually evaluation Data Employee Line Changes Weekly Prod. Data Sheet Weekly Prod. Data Sheet Prod Schedule Completed order info sheet Prod. Supervisor Finance Dept Semi Annual Evaluation Slip Employees Employees semi annually increment report Weekly evaluation report Monthly evaluation report Current Production and semi-annual Increment System Semi Annually evaluation report Item BOM Order Info Job BOM Job Order Data Production Dept Prod. Schedule Job Info Operation BOM Work Study Dept Figure 5.2 : Context Diagram of the Existing System Level 1 DFD of the Existing System. The level 1 DFD identifies the major business processes at a high level and any of these processes can then be analyzed further - giving rise to a corresponding level 2 business process diagram. This process of more detailed analysis can then continue through level 3, 4 and so on. Figure 5.3 shows the level 1 DFD of the existing system and all major business process could be communicated to others clearly and easily. 49

9 Figure 5.3 : Level 1 DFD of the Existing System Further decomposed DFDs of Level I DFD of the existing system are available in Appendix D. 50

10 5.5 Business System Options (BSOs) Once the current system was documented and the requirements of the new system were understood, the different ways (BSOs) that the requirements can be met were investigated. Two main BSOs were identified and one was based on manual data entering system and second one was for using wireless devises to collect the daily job transaction. BSO 1 Entering of huge data volume was a one of the key areas that was considered. The data volume that was needed to be managed was very much high. Under this BSO option, manual data entering has been considered with eight data entry operators and eight additional client personal computes. Further additional network printer was needed to connect to the existing local area network other than the available network computer facilities. This BSO has been illustrated in Figure 5.4. Figure 5.4 : Visual Representation of BSO I 51

11 Software and hardware requirement for BSO I Minimum hardware and software requirements that are needed to install and run the BSO I is listed below. Server requirement Hardware 1 GHz processor RAM 1 GB or more Free hard disk space 10 GB or above VGA colour monitor Software Microsoft Windows Server 2000 or above with the latest patch or Windows NT with latest patch Database requirement In addition to the operating system of the server, we need to have a database installed on the server. The following databases are supported: Microsoft SQL Server 2000 Standard Edition or SQL Server 2005 Standard Edition, with the latest service pack Microsoft SQL Server 2000 Enterprise Edition or SQL Server 2005 Enterprise Edition, with the latest service pack Client machine requirement Eight PCs needed with following configurations Hardware 1 GHz or above processor RAM 256 MB or more Free hard disk space 500 MB or above VGA colour monitor Software Windows Vista or Microsoft Windows XP Professional SP2 or Microsoft Windows

12 Printer Laser printer Network connection Local Area Network Speed 100 Mbps or above Development tools Coding language Visual Studio 6 ( VB 6) or above Report development tool Crystal Report 8 or above BSO 11 Under BSO II the possibility of automation of capturing data using wireless hand held devices were considered. In this scenario, only one additional user was considered with one additional client computer. Other than that one printer was needed to be added to the existing network. Further, wireless access facility to the local area network was needed to be activated and six wireless hand held computers (scanning bar-coding units) were considered. Three barcode printers also were needed for barcode printing. Figure 5.5 shows the architecture of the BSO II. Figure 5.5 : Visual Representation of BSO II 53

13 Software and hardware requirement for BSO II Minimum hard ware and software requirements that need to install and run the BSO II are listed below. Server requirement Hardware 1 GHz processor RAM 1 GB or more Free hard disk space 10 GB or above VGA colour monitor Software Microsoft Windows Server 2000 or above with the latest patch or Windows NT with latest patch Database requirement In addition to the operating system of the server, we need to have a database installed on the server. The following databases are supported: Microsoft SQL Server 2000 Standard Edition or SQL Server 2005 Standard Edition, with the latest service pack Microsoft SQL Server 2000 Enterprise Edition or SQL Server 2005 Enterprise Edition, with the latest service pack Client machine requirement One client computer is needed with following configurations Hardware 1 GHz or above processor RAM 256 MB or more Free hard disk space 500 MB or above VGA colour monitor Software Windows Vista or Microsoft Windows XP Professional SP2 or Microsoft Windows

14 Printer One Laser printer Three printers for barcode printing Wireless handheld computers (barcode scanning units) Six units are needed Network connection Local Area Network with wireless access facility Speed 100 Mbps or above Development tools Coding language Visual Studio 6 ( VB 6) or above Report development tool Crystal Report 8 or above 5.6 Feasibility Study Feasibility study was done for the identified two BSOs in order to decide whether or not it is worth carrying on with system development process. Since the company is already having LAN including database servers, application servers and around 200 PCs including necessary software that needs to develop the application and to store the data, environment was feasible enough for the implementation of the target MIS. Feasibility was evaluated under three key areas. 1. Technical Feasibility. 2. Operational Feasibility. 3. Economic Feasibility Technical Feasibility. Company is already having the necessary technology & Skills that needs to implement the proposed system. Local Area Network (LAN) and MS Sql Database server are already available. Since the speed of LAN is 1000 Mbps and all the workstations in the net works are having Windows XP operating system with memory more than 512 Mb, speed more than 2 GHz, above two BSOs can be installed in the existing network without any issue. 55

15 5.6.2 Operational Feasibility. Since all the users are currently using computers, facilities, Internet facilities, there is no need to train the users specially to operate this system. Further the company is having an Enterprise Recourse Planning (ERP) system and all the activities are integrated through this system, the LAN has been established in a way that the ERP can be operated smoothly and efficiently. It implies that the down time of the network is very less and well established with a high speed network. Since, BSO I and BSO II is also being gone to install on this network, the delivery of information at the right place on right time can be assured. In order to implement the bar-coding system in wireless network environment, new bar-coding method has to be introduced, enabling to capture production output of each operation through the handheld wireless devices. Barcode has to be introduced including the data like Job no, operation, machine etc. But in the investigation stage, it was found that introducing a bar-coding in the existing production setup is difficult because of the complexity of the operations of the production. So, when existing complex production environment is considered, BSO II is not operationally feasible because of inability of using of barcodes Economic Feasibility For the BSO I, only additional data entry operators have to be recruited and PCs for them have to be purchased with an additional network printer. For the BSO II, six wire less bar-coding units have to be purchased. Further barcode printers have to be purchased and barcode tags have to be printed. Cost wise both BSOs are within the approved budget limit and hence both BSOs are economically feasible. 5.7 Selected BSO and Justification Both BSOs satisfied all the functional and Non-functional requirements. Comparison report is available in Appendix E. When huge data volume that has to be captured to the system is considered, it is very easy if BSO II can be implemented because all the data can be collected through handheld bar-coding scanners. Time consumption for data inputting is very less and accuracy is also very much high. But although, BSO I is Technically, Operationally, Economically feasible, BSO II is not Operationally feasible because it is very mush difficult use barcodes when considered the way of 56

16 production at each stages of operations. Further BSO I is more cost effective than the BSO II. Hence BSO I was selected as the best and feasible solution. 5.8 DFDs of the Proposed System Context Diagrams of the Proposed System Since, System Context Diagrams are diagrams which are used in systems design to represent all external entities that may interact with a system, the same was drawn for the proposed system too and shown in Figure 5.6. This diagram shows the highest level view of a system proposed system and shows the system at the center, surrounding by all its interacting systems, environment and activities with its inputs and outputs from/to external factors/entities. The objective of a system context diagram was to focus attention on external factors and events that should be considered in developing a complete set of system requirements and constraints. Work Study Dept Production Dept Shift wise daily production data Productivity bonus report Job Timing Job Master data data Trans Timing Sheet Transformer Master Data Productivi ty info Standard Timing data Machine data New Operations Trans Timing Sheet Online Mgt. Information Managers New Production Line master Data Productivity Measuring System Line and Machine mapping Line Productivity parameters Weekly line wise work Hrs HR dept Employee Master data Employee Line changes Monthly Productivity Bonus report Employees Weekly Productivity Bonus report Monthly Line wise Productivity bonus Report Finance Dept Figure 5.6 : Context Diagram of the Proposed System 57

17 5.8.2 Level 1 Data Flow Diagrams of the Proposed System Level 1 DFD was drawn in order to identify the major business processes at a high level and in order to further analyze these processes - giving rise to a corresponding level 2 business process diagram. Level 1 DFD of the proposed system is shown in the Figure 5.7. Then level 2 DFDs were drawn by further decomposing the higher level business processes which were shown in level 1 DFD. All the level 2 DFDs are available in the Appendix F. 58

18 Figure 5.7 : Level 1 DFD of the Proposed System 59

19 5.9 Architectural Design of the System System decomposition into subsystems or architectural components is very much important because a good decomposition satisfies the principle of loose coupling between the pieces, facilitated by clean interfaces, simplifying the problem by dividing it into reasonably independent pieces that can be tackled separately. In order to reduce the complexity and to support for early delivery of the system, complete system was decomposed in to three major modules as in following Figure 5.8. Decomposing was done such a way that the decomposed structure supports the functionality or services required of the system and maintains the system integrity. Proposed Productivity Measurement System Work-study Timing Sheet Generation Line wise Productivity Generation Management Dashboard Figure 5.8 : High level Architectural Design of the Proposed System Based on the architectural design of the system, system development was done under three phases. As the first phase, work-study timing sheet generation was completed and implemented. Then productivity calculation module was developed and implemented. Final implementation was the management dash board for analyzing and monitoring the productivity. RAD (Rapid Application Development) methodology which gives faster development and higher quality was used as the development methodology. Since there were three main modules, application development was done phase wise by using incremental and Iterative approach that emphasizes continuous user involvement. Its goal was to deliver the software systems on time and on budget while adjusting for changing requirements along the development process. Software Development Life Cycle (SDLC) can be illustrated as in below Figure

20 Figure 5.9 : System Development Life Cycle 5.10 Database Design For the proposed system, MS SQL Server database which is a Relational Database Management System (RDBMS) was used. The advantages of using an RDBMS are as follows; No data redundancy Data Integrity Reduced data duplication Data security Improve storage space efficiency The database was normalized up to third normal form and aappropriate user permissions were set based on the authority level of the each user in order to achieve the security requirements of the data Logical Data Structure Logical Data Structure (LDS) is a diagram to show relationships between entities. LDS for the system was built by following below three steps and shown in Figure Identify the entities - Find the RELATIONSHIPS between them - Decide the CARDINALITY 61

21 The purposes of developing the LDS are listed below - To provide a common understanding of business data elements and requirements - To provides foundation for designing a database - To facilitates avoidance of data redundancy and thus prevent data & business transaction inconsistency - To facilitates data re-use and sharing Figure 5.10 : Logical Data Structure 62

22 Relation Ship Diagram Entity Relationship(ER) Diagrams are a major data modelling tool and helps to organize the data in the project and define the relationships between the entities. Entity, relation, and attributes were considered to form a conceptual view of data. In order to make easy of creating and maintaining the database structures, entity relational data model was created based on the logical Data Structure. It is shown in Figure Primary key fields which provide a unique identifier for each record were identified and relationships between tables were created using matching fields of tables. Figure 5.11 : Relation Ship Diagram 63

23 5.11 Graphical User Interface (GUI) Design Technology alone may not win user acceptance and how the user experiences the end product, is the key to acceptance. Hence much attention was paid in the process of user interface designing in order to deliver a user friendly application. A common template was used in all the interfaces to maintain the consistency. In order to improve the usability of the system, always best practices of GUI designing were used in user interface designing. Some of the focused factors are listed below. Visibility of system status Interfaces were designed such a way that system should always keep users informed about what is going on, through appropriate feedback within reasonable time. Keeping buttons in active mode and inactive mode, using different colours, system messages like techniques were used. Match between system and the real world All the efforts were taken to ensure that the system speaks the users' language, with words, phrases and concepts familiar to the user, rather than systemoriented terms. Real-world conventions were followed while making information appear in a natural and logical order. User control and freedom Exit facility was provided in all the interfaces in order to provide facility to leave the unwanted state without having to go through an extended dialogue. This is because Users often choose system functions by mistake. Error prevention All the possible areas were carefully designed such a way that prevents from problems occurring by giving better error messages in the first place and presented users with a confirmation option before they commit to the action. Recognition rather than recall Efforts were taken to minimize the loading of user's memory by making objects, actions, and options visible. Instructions were kept visible or easily retrievable whenever appropriate. Further interfaces were designed such a way that user does not need to remember information from one part of the dialogue to another. 64

24 Aesthetic and minimalist design Irrelevant information or rarely needed information was not included in the dialogues because every extra unit of information diminishes their relative visibility. Help users recognize, diagnose, and recover from errors Error messages were expressed in plain language (no codes), precisely indicate the problem, and constructively suggest a solution Summary System Analysis and Designing process was discussed in this chapter. Further, methodologies and techniques which were used for Requirement Analysis, Business Solution Options, Feasibility Study, and Architectural Design also have been discussed in this chapter. Next chapter discusses about the testing of the solution and implementation methodologies. 65

Computer Systems & Application

Computer Systems & Application For updated version, please click on http://ocw.ump.edu.my Computer Systems & Application Computer System and Application Development Process By Mr. Nor Azhar Ahmad Faculty of Computer Systems & Software

More information

1. The Best Practices Section < >

1. The Best Practices Section <   > DRAFT A Review of the Current Status of the Best Practices Project Website and a Proposal for Website Expansion August 25, 2009 Submitted by: ASTDD Best Practices Project I. Current Web Status A. The Front

More information

Jakob Nielsen s Heuristics (

Jakob Nielsen s Heuristics ( Jakob Nielsen s Heuristics (http://www.useit.com/papers/heuristic/heuristic_list.html) What is heuristic evaluation: Heuristic evaluation is done as a systematic inspection of a user interface design for

More information

Heuristic Evaluation. Jon Kolko Professor, Austin Center for Design

Heuristic Evaluation. Jon Kolko Professor, Austin Center for Design Heuristic Evaluation Jon Kolko Professor, Austin Center for Design Heuristic Evaluation Compare an interface to an established list of heuristics best practices to identify usability problems. Heuristic

More information

Heuristic Evaluation

Heuristic Evaluation Heuristic Evaluation For CS4760 & HU4628 Group 3 -- BAER Can Li (canli@mtu.edu) 2/17/2015 Background: The primary mission of BAER Teams is to protect lives, property and sensitive habitats from post-fire

More information

Due on: May 12, Team Members: Arpan Bhattacharya. Collin Breslin. Thkeya Smith. INFO (Spring 2013): Human-Computer Interaction

Due on: May 12, Team Members: Arpan Bhattacharya. Collin Breslin. Thkeya Smith. INFO (Spring 2013): Human-Computer Interaction Week 6 Assignment: Heuristic Evaluation of Due on: May 12 2013 Team Members: Arpan Bhattacharya Collin Breslin Thkeya Smith INFO 608-902 (Spring 2013): Human-Computer Interaction Group 1 HE Process Overview

More information

Heuristic Evaluation. Ananda Gunawardena. Carnegie Mellon University Computer Science Department Fall 2008

Heuristic Evaluation. Ananda Gunawardena. Carnegie Mellon University Computer Science Department Fall 2008 Heuristic Evaluation Ananda Gunawardena Carnegie Mellon University Computer Science Department Fall 2008 Background Heuristic evaluation is performed early in the development process to understand user

More information

Design Heuristics and Evaluation

Design Heuristics and Evaluation Design Heuristics and Evaluation Rapid Evaluation Selected material from The UX Book, Hartson & Pyla Heuristic Evaluation Another method for finding usability problems in a UI design Validation during

More information

iscreen Usability INTRODUCTION

iscreen Usability INTRODUCTION INTRODUCTION Context and motivation The College of IST recently installed an interactive kiosk called iscreen, designed to serve as an information resource for student/visitors to the College of IST. The

More information

User Interface Evaluation

User Interface Evaluation User Interface Evaluation Heuristic Evaluation Lecture #17 Agenda Evaluation through Expert Analysis Cognitive walkthrough Heuristic evaluation Model-based evaluation Cognitive dimension of notations 2

More information

Craigslist Heuristic Evaluation

Craigslist Heuristic Evaluation Heuristic Evaluation Introduction This document is a heuristic evaluation of part of the website. Due to the size of the website, this is a partial examination ed to showcase Al Strauss analytical capabilities.

More information

Introduction to Internet Applications

Introduction to Internet Applications to Internet Applications Internet Applications, ID1354 1 / 36 Contents 2 / 36 Section 3 / 36 Local Application We are familiar with an architecture where the entire application resides on the same computer.

More information

Lose It! Weight Loss App Heuristic Evaluation Report

Lose It! Weight Loss App Heuristic Evaluation Report Lose It! Weight Loss App Heuristic Evaluation Report By Manuel Ryan Espinsa Manuel Ryan Espinosa 1-27-2017 Heuristic Evaluation IN4MATX 283 LEC A: USER EXPERIENCE (37000) TABLE OF CONTENTS EXECUTIVE SUMMARY

More information

INFS 328 Systems Analysis and Design

INFS 328 Systems Analysis and Design INFS 328 Systems Analysis and Design Session 13 Systems Analysis and Construction Tools Lecturer: Prof. Ellis Edwin Badu, Dept. of Information Studies Contact Information: eebadu@ug.edu.gh College of Education

More information

1. Select/view stores based on product type/category- 2. Select/view stores based on store name-

1. Select/view stores based on product type/category- 2. Select/view stores based on store name- COMPETITIVE ANALYSIS Context The world of mobile computing is fast paced. There are many developers providing free and subscription based applications on websites like www.palmsource.com. Owners of portable

More information

User Experience Report: Heuristic Evaluation

User Experience Report: Heuristic Evaluation User Experience Report: Heuristic Evaluation 1 User Experience Report: Heuristic Evaluation Created by Peter Blair for partial fulfillment of the requirements for MichiganX: UX503x Principles of Designing

More information

HCI and Design SPRING 2016

HCI and Design SPRING 2016 HCI and Design SPRING 2016 Topics for today Heuristic Evaluation 10 usability heuristics How to do heuristic evaluation Project planning and proposals Usability Testing Formal usability testing in a lab

More information

Assignment 5 is posted! Heuristic evaluation and AB testing. Heuristic Evaluation. Thursday: AB Testing

Assignment 5 is posted! Heuristic evaluation and AB testing. Heuristic Evaluation. Thursday: AB Testing HCI and Design Topics for today Assignment 5 is posted! Heuristic evaluation and AB testing Today: Heuristic Evaluation Thursday: AB Testing Formal Usability Testing Formal usability testing in a lab:

More information

Usability in Multimedia. By Pınar Koçer Aydın and Özgür Bayram

Usability in Multimedia. By Pınar Koçer Aydın and Özgür Bayram Usability in Multimedia By Pınar Koçer Aydın and Özgür Bayram 1 OUTLINE: Part 1: What is usability and what it isn t Part 2: Jakob Nielsen s 10 principles Part 3: The user experience testing Part 4: Application

More information

Ovation Process Historian

Ovation Process Historian Ovation Process Historian Features Designed to meet the needs of precision, performance, scalability and historical data management for the Ovation control system Collects historical data of Ovation process

More information

Hyper Mesh Code analyzer

Hyper Mesh Code analyzer Hyper Mesh Code analyzer ABSTRACT Hyper Mesh Code Analyzer (HMCA) is a text based programming environment, designed for programmers to write their source code in a more organized and manageable fashion.

More information

Usability. Daniela Rosner. Web Architecture, October 9, School of Information UC Berkeley

Usability. Daniela Rosner. Web Architecture, October 9, School of Information UC Berkeley Usability Daniela Rosner Web Architecture, 290-03 October 9, 2007 School of Information UC Berkeley Outline Introduction what is usability Best Practices common solutions Design Patterns shared languages

More information

IBM SPSS Text Analytics for Surveys

IBM SPSS Text Analytics for Surveys Software Product Compatibility Reports Product IBM SPSS Text Analytics for Surveys 4.0.1.0 Contents Included in this report Operating systems Hypervisors (No hypervisors specified for this product) Prerequisites

More information

MYOB Enterprise Solutions

MYOB Enterprise Solutions Enterprise Solutions System Requirement Guidelines Last Updated: 16 May 2017 Contents Important Please Read Carefully 4 Quick Links 4 System Requirements 5 Overview... 5 Server Requirements... 6 Server

More information

Heuristic Evaluation of Enable Ireland

Heuristic Evaluation of Enable Ireland Heuristic Evaluation of Enable Ireland Aesthetic and minimalist design Pages should not contain information which is irrelevant or rarely needed. Currently, there is too much content on the Enable Ireland

More information

1. i. What are the 3 major components of a information system and show their relationship input output

1. i. What are the 3 major components of a information system and show their relationship input output Higher National Diploma in Information Technology First Year, Second semesterexamination-2011 IT2005: System Analysis and Design Answer Script No. of pages: 11 1. i. What are the 3 major components of

More information

International School of Informatics and management, Jaipur Billing System Synopsis TEAM GROUP - 04 TEAM MEMBERS -ANIL KUMAR ANJANA -BHAIYA LAL ANJANA

International School of Informatics and management, Jaipur Billing System Synopsis TEAM GROUP - 04 TEAM MEMBERS -ANIL KUMAR ANJANA -BHAIYA LAL ANJANA International School of Informatics and management, Jaipur Billing System Synopsis TEAM GROUP - 04 TEAM MEMBERS -ANIL KUMAR ANJANA -BHAIYA LAL ANJANA -SAURABH JAIN PROJECT GUIDE - Ms JYOTI KHURANA (Lecturer

More information

MYOB Enterprise Solutions System Requirement Guidelines. Wednesday 21 st March 2012 Version 2.6

MYOB Enterprise Solutions System Requirement Guidelines. Wednesday 21 st March 2012 Version 2.6 Wednesday 21 st March 2012 Version 2.6 Contents 1 SYSTEM REQUIREMENTS... 4 1.1 OVERVIEW... 4 1.2 SERVER REQUIREMENTS... 4 1.2.1 SERVER REQUIREMENTS (EXCLUDING TERMINAL SERVER)... 4 1.2.2 WINDOWS TERMINAL

More information

Q1) Describe business intelligence system development phases? (6 marks)

Q1) Describe business intelligence system development phases? (6 marks) BUISINESS ANALYTICS AND INTELLIGENCE SOLVED QUESTIONS Q1) Describe business intelligence system development phases? (6 marks) The 4 phases of BI system development are as follow: Analysis phase Design

More information

How Turner Broadcasting can avoid the Seven Deadly Sins That. Can Cause a Data Warehouse Project to Fail. Robert Milton Underwood, Jr.

How Turner Broadcasting can avoid the Seven Deadly Sins That. Can Cause a Data Warehouse Project to Fail. Robert Milton Underwood, Jr. How Turner Broadcasting can avoid the Seven Deadly Sins That Can Cause a Data Warehouse Project to Fail Robert Milton Underwood, Jr. 2000 Robert Milton Underwood, Jr. Page 2 2000 Table of Contents Section

More information

Surveyor 6 Product Guide

Surveyor 6 Product Guide Surveyor 6 Product Guide Verdiem is a pioneer in IT energy management & efficiency, delivering a best-in-class solution that helps you accurately measure IT device utilization, enforce policies for greater

More information

Systems Analysis and Design in a Changing World, Fourth Edition

Systems Analysis and Design in a Changing World, Fourth Edition Systems Analysis and Design in a Changing World, Fourth Edition Systems Analysis and Design in a Changing World, 4th Edition Learning Objectives Explain the purpose and various phases of the systems development

More information

Contents. Microsoft is a registered trademark of Microsoft Corporation. TRAVERSE is a registered trademark of Open Systems Holdings Corp.

Contents. Microsoft is a registered trademark of Microsoft Corporation. TRAVERSE is a registered trademark of Open Systems Holdings Corp. TPLWPT Contents Summary... 1 General Information... 1 Technology... 2 Server Technology... 2 Business Layer... 4 Client Technology... 4 Structure... 4 Ultra-Thin Client Considerations... 7 Internet and

More information

GEMS Software System Requirements Frequently Asked Questions

GEMS Software System Requirements Frequently Asked Questions GEMS Software System Requirements Frequently Asked Questions Recommended and Required PC Configurations for GEMS Installations The following information lists the minimum PC hardware and software environment

More information

MYOB ENTERPRISE SOLUTIONS. System Requirement Guidelines EXO BUSINESS. Version 2.9 Thursday 1 st May 2014 MYOB ENT ER P R IS E S OLUT IONS

MYOB ENTERPRISE SOLUTIONS. System Requirement Guidelines EXO BUSINESS. Version 2.9 Thursday 1 st May 2014 MYOB ENT ER P R IS E S OLUT IONS MYOB ENTERPRISE SOLUTIONS System Requirement Guidelines Version 2.9 Thursday 1 st May 2014 EXO BUSINESS MYOB ENT ER P R IS E S OLUT IONS Contents Important Please Read Carefully... 3 Quick Links... 3 System

More information

TASKS IN THE SYSTEMS DEVELOPMENT LIFE CYCLE

TASKS IN THE SYSTEMS DEVELOPMENT LIFE CYCLE SUMMARY AND REFERENCE ACTG 313 TASKS IN THE SYSTEMS DEVELOPMENT LIFE CYCLE PREPARATION PHASE 1. Identification of the Need for a new Information System 2. Initial Feasibility Study (always flawed because

More information

CSE 440: Introduction to HCI User Interface Design, Prototyping, and Evaluation

CSE 440: Introduction to HCI User Interface Design, Prototyping, and Evaluation CSE 440: Introduction to HCI User Interface Design, Prototyping, and Evaluation Lecture 12: Inspection-Based Methods James Fogarty Daniel Epstein Brad Jacobson King Xia Tuesday/Thursday 10:30 to 11:50

More information

CSE 440: Introduction to HCI User Interface Design, Prototyping, and Evaluation

CSE 440: Introduction to HCI User Interface Design, Prototyping, and Evaluation CSE 440: Introduction to HCI User Interface Design, Prototyping, and Evaluation Lecture 11: Inspection Tuesday / Thursday 12:00 to 1:20 James Fogarty Kailey Chan Dhruv Jain Nigini Oliveira Chris Seeds

More information

CO328- Human Computer Interaction Michael Kölling Caroline Li. Heuristic Evaluation

CO328- Human Computer Interaction Michael Kölling Caroline Li. Heuristic Evaluation CO328- Human Computer Interaction Michael Kölling Caroline Li Heuristic Evaluation Signage: What does this tells you? - History, what went earlier there before - Tells you more about a problematic situation

More information

Centrix WorkSpace Discovery Installation Guide. Version 1.0

Centrix WorkSpace Discovery Installation Guide. Version 1.0 Centrix WorkSpace Discovery Installation Guide Version 1.0 The latest software version and documentation for this product can be downloaded here: http://www.centrixsoftware.com/downloads/discovery If you

More information

INFS 328 Systems Analysis and Design

INFS 328 Systems Analysis and Design INFS 328 Systems Analysis and Design Session 6 System Design Part 1 Lecturer: Prof. Ellis Edwin Badu, Dept. of Information Studies Contact Information: eebadu@ug.edu.gh College of Education School of Continuing

More information

TDWI Data Modeling. Data Analysis and Design for BI and Data Warehousing Systems

TDWI Data Modeling. Data Analysis and Design for BI and Data Warehousing Systems Data Analysis and Design for BI and Data Warehousing Systems Previews of TDWI course books offer an opportunity to see the quality of our material and help you to select the courses that best fit your

More information

Darshan Institute of Engineering & Technology for Diploma Studies Rajkot Unit-1

Darshan Institute of Engineering & Technology for Diploma Studies Rajkot Unit-1 Failure Rate Darshan Institute of Engineering & Technology for Diploma Studies Rajkot Unit-1 SOFTWARE (What is Software? Explain characteristics of Software. OR How the software product is differing than

More information

UX DESIGN BY JULIA MITELMAN

UX DESIGN BY JULIA MITELMAN UX DESIGN BY JULIA MITELMAN TOPICS Why should we care? Usability Heuristics It s all about Context The Visual Applied Psychology The Pursuit of Product Design WHY SHOULD WE CARE? (IT S ALWAYS THE DESIGNER

More information

Software Operations Manual

Software Operations Manual Software Operations Manual Version 5.0 System Requirements PC with 1GHz or higher, Intel Pentium Processor or compatible Microsoft Windows XP Professional or Vista Business Edition Microsoft.NET framework

More information

Minimum System Requirements for Horizon s new Windows Product

Minimum System Requirements for Horizon s new Windows Product Introduction The Windows Version of Horizon s PROMISE home care management software is a web-enabled application that will be hosted on your own in-house server and accessed over your local area or wide-area

More information

Heuristic Evaluation of NUIG Participate Module 1

Heuristic Evaluation of NUIG Participate Module 1 Heuristic Evaluation of NUIG Participate Module 1 Nielsen s 10 Usability Heuristics (Nielsen & Mack, 1994) 1. Aesthetic & Minimalist Design Pages should not contain information which is irrelevant or rarely

More information

C H A P T E R SYSTEM DESIGN

C H A P T E R SYSTEM DESIGN C H A P T E R SYSTEM DESIGN Chapter Twelve Systems Design Describe the design phase in terms of your information building blocks. Identify and differentiate between several systems design strategies. Describe

More information

The Impact of Disk Fragmentation on Servers. By David Chernicoff

The Impact of Disk Fragmentation on Servers. By David Chernicoff The Impact of Disk Fragmentation on Servers By David Chernicoff Published: May 2009 The Impact of Disk Fragmentation on Servers Testing Server Disk Defragmentation IT defragmentation software brings to

More information

MYOB Enterprise Solutions software system requirements guidelines. Thursday, 6 May 2010 Version 2.0

MYOB Enterprise Solutions software system requirements guidelines. Thursday, 6 May 2010 Version 2.0 MYOB Enterprise Solutions software system Thursday, 6 May 2010 Version 2.0 Contents 1 System Requirements... 4 1.1 Overview... 4 1.2 Server requirements... 4 1.2.1 Server Requirements (excluding Terminal

More information

Database Analysis and Design

Database Analysis and Design Database Analysis and Design Marek Rychly mrychly@strathmore.edu Strathmore University, @ilabafrica & Brno University of Technology, Faculty of Information Technology Advanced Databases and Enterprise

More information

Chapter 5 Practice: A Generic View

Chapter 5 Practice: A Generic View Chapter 5 Practice: A Generic View Moonzoo Kim CS Division of EECS Dept. KAIST moonzoo@cs.kaist.ac.kr http://pswlab.kaist.ac.kr/courses/cs550-07 Spring 2007 1 What is Practice? Practice is a broad array

More information

cs465 principles of user interface design, implementation and evaluation

cs465 principles of user interface design, implementation and evaluation cs465 principles of user interface design, implementation and evaluation Karrie G. Karahalios 24. September 2008 1. Heuristic Evaluation 2. Cognitive Walkthrough 3. Discuss Homework 3 4. Discuss Projects

More information

Assignment Semester 2 IT Skills(WBL version) CE

Assignment Semester 2 IT Skills(WBL version) CE Staffordshire University Assignment Semester 2 IT Skills(WBL version) CE00891 1 Hand In Date Part one 12th March 2010 Demonstration of Part two week commencing 3 rd May 2010 Contents Your Task is to do

More information

Administrator s Guide

Administrator s Guide Administrator s Guide 1995 2011 Open Systems Holdings Corp. All rights reserved. No part of this manual may be reproduced by any means without the written permission of Open Systems, Inc. OPEN SYSTEMS

More information

SUGGESTED SOLUTION IPCC MAY 2017EXAM. Test Code - I M J

SUGGESTED SOLUTION IPCC MAY 2017EXAM. Test Code - I M J SUGGESTED SOLUTION IPCC MAY 2017EXAM INFORMATION TECHNOLOGY Test Code - I M J 7 1 2 1 BRANCH - (MULTIPLE) (Date : 20.11.2016) Head Office : Shraddha, 3 rd Floor, Near Chinai College, Andheri (E), Mumbai

More information

(Complete Package) We are ready to serve Latest Testing Trends, Are you ready to learn? New Batches Info

(Complete Package) We are ready to serve Latest Testing Trends, Are you ready to learn? New Batches Info (Complete Package) WEB APP TESTING DB TESTING We are ready to serve Latest Testing Trends, Are you ready to learn? New Batches Info START DATE : TIMINGS : DURATION : TYPE OF BATCH : FEE : FACULTY NAME

More information

IBM Proventia Management SiteProtector Installation Guide

IBM Proventia Management SiteProtector Installation Guide IBM Internet Security Systems IBM Proventia Management SiteProtector Installation Guide Version2.0,ServicePack8.1 Note Before using this information and the product it supports, read the information in

More information

ONLINE BILLBOARD VIKRAM KUMAR KONDAPANENI B.TECH, ACHARYA NAGARJUNA UNIVERSITY, 2007 A REPORT

ONLINE BILLBOARD VIKRAM KUMAR KONDAPANENI B.TECH, ACHARYA NAGARJUNA UNIVERSITY, 2007 A REPORT ONLINE BILLBOARD By VIKRAM KUMAR KONDAPANENI B.TECH, ACHARYA NAGARJUNA UNIVERSITY, 2007 A REPORT Submitted in partial fulfillment of the requirements for the degree MASTER OF SCIENCE Department of Computing

More information

Chapter 10. Database System Development Lifecycle

Chapter 10. Database System Development Lifecycle Chapter 10 Database System Development Lifecycle Chapter 10 - Objectives Main components of an information system. Main stages of database system development lifecycle. Main phases of database design:

More information

FAS Asset Accounting FAS Asset Inventory FAS CIP Accounting Network Installation & Administration Guide Version

FAS Asset Accounting FAS Asset Inventory FAS CIP Accounting Network Installation & Administration Guide Version FAS Asset Accounting FAS Asset Inventory FAS CIP Accounting Network Installation & Administration Guide Version 2009.1 2009 Sage Software, Inc. All rights reserved. Portions Copyrighted 1991-2001 by ianywhere

More information

evaluation techniques goals of evaluation evaluation by experts cisc3650 human-computer interaction spring 2012 lecture # II.1

evaluation techniques goals of evaluation evaluation by experts cisc3650 human-computer interaction spring 2012 lecture # II.1 topics: evaluation techniques usability testing references: cisc3650 human-computer interaction spring 2012 lecture # II.1 evaluation techniques Human-Computer Interaction, by Alan Dix, Janet Finlay, Gregory

More information

Tivoli Inventory 4.0 Provides A Cross-Platform Automated Solution For Inventory Management

Tivoli Inventory 4.0 Provides A Cross-Platform Automated Solution For Inventory Management Software Announcement May 1, 2001 Tivoli Inventory 4.0 Provides A Cross-Platform Automated Solution For Inventory Management Overview Challenged by the need to efficiently maintain accurate IT asset information

More information

SCLIntra Enterprise Product Summary

SCLIntra Enterprise Product Summary SCLIntra Enterprise Product Summary SCLIntra uses barcoding technology to monitor and control the flow of tangible objects mail, parcels, property, files or people as they enter and move through a facility.

More information

Design Principles. Overview. User-Center Design. SMD157 Human-Computer Interaction Fall User-center design Guidelines

Design Principles. Overview. User-Center Design. SMD157 Human-Computer Interaction Fall User-center design Guidelines INSTITUTIONEN FÖR SYSTEMTEKNIK LULEÅ TEKNISKA UNIVERSITET Design Principles SMD157 Human-Computer Interaction Fall 2005 Nov-4-05 SMD157, Human-Computer Interaction 1 L Overview User-center design Guidelines

More information

CogSysIII Lecture 9: User Modeling with GOMS

CogSysIII Lecture 9: User Modeling with GOMS CogSysIII Lecture 9: User Modeling with GOMS Human Computer Interaction Ute Schmid Applied Computer Science, University of Bamberg last change June 26, 2007 CogSysIII Lecture 9: User Modeling with GOMS

More information

Design Principles. Overview. User-Center Design. SMD157 Human-Computer Interaction Fall User-center design Guidelines

Design Principles. Overview. User-Center Design. SMD157 Human-Computer Interaction Fall User-center design Guidelines INSTITUTIONEN FÖR SYSTEMTEKNIK LULEÅ TEKNISKA UNIVERSITET Design Principles SMD157 Human-Computer Interaction Fall 2003 Nov-6-03 SMD157, Human-Computer Interaction 1 L Overview User-center design Guidelines

More information

Chapter 13. Application Architecture and Modeling. McGraw-Hill/Irwin. Copyright 2007 by The McGraw-Hill Companies, Inc. All rights reserved.

Chapter 13. Application Architecture and Modeling. McGraw-Hill/Irwin. Copyright 2007 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 13 Application Architecture and Modeling McGraw-Hill/Irwin Copyright 2007 by The McGraw-Hill Companies, Inc. All rights reserved. Objectives 13-2 Define an information system s architecture in

More information

Chapter 5. The Database Life Cycle. Class 04: Topic 3.1: The Database Life Cycle

Chapter 5. The Database Life Cycle. Class 04: Topic 3.1: The Database Life Cycle Chapter 5 The Database Life 1 Database Design Life Database Life : all the events from the time the database is first proposed to the time it is retired from service Work is typically divided into project

More information

ONLINE SHOPPING CHAITANYA REDDY MITTAPELLI. B.E., Osmania University, 2005 A REPORT

ONLINE SHOPPING CHAITANYA REDDY MITTAPELLI. B.E., Osmania University, 2005 A REPORT ONLINE SHOPPING By CHAITANYA REDDY MITTAPELLI B.E., Osmania University, 2005 A REPORT Submitted in partial fulfillment of the requirements for the degree MASTER OF SCIENCE Department of Computing and Information

More information

Phire Frequently Asked Questions - FAQs

Phire Frequently Asked Questions - FAQs Phire Frequently Asked Questions - FAQs Phire Company Profile Years in Business How long has Phire been in business? Phire was conceived in early 2003 by a group of experienced PeopleSoft professionals

More information

2. GIS hardware and software for fisheries and aquaculture G.J. Meaden (FAO consultant, Canterbury, United Kingdom)

2. GIS hardware and software for fisheries and aquaculture G.J. Meaden (FAO consultant, Canterbury, United Kingdom) 7 2. GIS hardware and software for fisheries and aquaculture G.J. Meaden (FAO consultant, Canterbury, United Kingdom) While it is recognized that many individuals or groups wishing to utilize GIS for fisheries

More information

COIT20248: Information Systems Analysis and Design Term 2, 2015 Assignment 2. Lecturer: Dr. Meena Jha Tutor: Aries Tao

COIT20248: Information Systems Analysis and Design Term 2, 2015 Assignment 2. Lecturer: Dr. Meena Jha Tutor: Aries Tao COIT20248: Information Systems Analysis and Design Term 2, 2015 Assignment 2 Lecturer: Dr. Meena Jha Tutor: Aries Tao Prepared by: AXXXX XXXX: S0XXXXXX AXXXX MXXXXX: BisXXXXX BaXXXX: S0XXXXX S02XXXX SXXXXX

More information

Overview. What is system analysis and design? Tools and models Methodologies

Overview. What is system analysis and design? Tools and models Methodologies Overview What is system analysis and design? Tools and models Methodologies Information Systems What is a system? Why do systems fail? What is systems analysis and design? How do we do systems analysis?

More information

Petrel TIPS&TRICKS from SCM

Petrel TIPS&TRICKS from SCM Petrel TIPS&TRICKS from SCM Knowledge Worth Sharing Merging Overlapping Files into One 2D Grid Often several files (grids or data) covering adjacent and overlapping areas must be combined into one 2D Grid.

More information

Alkan University College Student Information Management System

Alkan University College Student Information Management System American Journal of Operations Management and Information Systems 2016; 1(1): 1-6 http://www.sciencepublishinggroup.com/j/ajomis doi: 10.11648/j.ajomis.20160101.11 Alkan University College Student Information

More information

1 Preface and overview Functional enhancements Improvements, enhancements and cancellation System support...

1 Preface and overview Functional enhancements Improvements, enhancements and cancellation System support... Contents Contents 1 Preface and overview... 3 2 Functional enhancements... 6 2.1 "Amazonification" of the application... 6 2.2 Complete integration of Apache Solr... 7 2.2.1 Powerful full text search...

More information

Practical IT Research that Drives Measurable Results OptimizeIT Strategic Planning Bundle

Practical IT Research that Drives Measurable Results OptimizeIT Strategic Planning Bundle Practical IT Research that Drives Measurable Results OptimizeIT Strategic Planning Bundle Info-Tech Research Group 1 An IT Strategy must lay out a roadmap and budget for investment to establish the systems,

More information

F-Secure Client Security. Quick Installation Guide

F-Secure Client Security. Quick Installation Guide F-Secure Client Security Quick Installation Guide F-Secure Client Security TOC 3 Contents Chapter 1: Introduction...5 Chapter 2: Installing Client Security...7 System requirements...8 Stand-alone installation...9

More information

QM Chapter 1 Database Fundamentals Version 10 th Ed. Prepared by Dr Kamel Rouibah / Dept QM & IS

QM Chapter 1 Database Fundamentals Version 10 th Ed. Prepared by Dr Kamel Rouibah / Dept QM & IS QM 433 - Chapter 1 Database Fundamentals Version 10 th Ed Prepared by Dr Kamel Rouibah / Dept QM & IS www.cba.edu.kw/krouibah Dr K. Rouibah / dept QM & IS Chapter 1 (433) Database fundamentals 1 Objectives

More information

Vol. 1 Introduction. OMS-100 User Manual. Publishing version: V2.2. Publishing version: V2.2 1

Vol. 1 Introduction. OMS-100 User Manual. Publishing version: V2.2. Publishing version: V2.2 1 Vol. 1 Introduction OMS-100 User Manual Publishing version: V2.2 Publishing version: V2.2 1 OMS-100 User Manual Table of Contents I Vol. 1 Introduction 5 2 1 Foreword... 5 1.1 Typographical Conventions...

More information

Chapter 2 CommVault Data Management Concepts

Chapter 2 CommVault Data Management Concepts Chapter 2 CommVault Data Management Concepts 10 - CommVault Data Management Concepts The Simpana product suite offers a wide range of features and options to provide great flexibility in configuring and

More information

Systems Analysis & Design

Systems Analysis & Design Systems Analysis & Design Dr. Arif Sari Email: arif@arifsari.net Course Website: www.arifsari.net/courses/ Slide 1 Adapted from slides 2005 John Wiley & Sons, Inc. Slide 2 Course Textbook: Systems Analysis

More information

Requirement Analysis

Requirement Analysis Requirement Analysis Requirements Analysis & Specification Objective: determine what the system must do to solve the problem (without describing how) Done by Analyst (also called Requirements Analyst)

More information

LIBREOFFICE TRAINING PROTOCOL

LIBREOFFICE TRAINING PROTOCOL LIBREOFFICE TRAINING PROTOCOL LibreOffice Training Protocol is a reference for professionals offering training services for LibreOffice, targeted at organizations and individuals deploying the free office

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) 1. Domain 1 The Process of Auditing Information Systems Provide audit services in accordance with IT audit standards to assist the organization in protecting

More information

Introduction to User Stories. CSCI 5828: Foundations of Software Engineering Lecture 05 09/09/2014

Introduction to User Stories. CSCI 5828: Foundations of Software Engineering Lecture 05 09/09/2014 Introduction to User Stories CSCI 5828: Foundations of Software Engineering Lecture 05 09/09/2014 1 Goals Present an introduction to the topic of user stories concepts and terminology benefits and limitations

More information

Project Synopsis Project Title Social Networking Site Project Develpers 1. 2. 3. Introduction Social networking sites allow users to communicate with people, share ideas, activities, events, and interests

More information

Crab Shack Kitchen Web Application

Crab Shack Kitchen Web Application Crab Shack Kitchen Web Application EVALUATION ASSIGNMENT 2 HEURISTIC EVALUATION Author: Sachin FERNANDES Graduate 8 Undergraduate Team 2 Instructor: Dr. Robert PASTEL February 16, 2016 LIST OF FIGURES

More information

SPS Commerce WebForms Reference Guide

SPS Commerce WebForms Reference Guide SPS Commerce WebForms Reference Guide Table of Contents Table of Contents... i Introduction to the WebForms System... 1 Welcome... 1 What is WebForms?... 1 Requirements What do I need to get started?...

More information

Group #: Evaluation Proposal For Digital Libraries, LIS 5472, Fall 2010, Professor Sanghee Oh

Group #: Evaluation Proposal For Digital Libraries, LIS 5472, Fall 2010, Professor Sanghee Oh Group #: Evaluation Proposal For Digital Libraries, LIS 5472, Fall 2010, Professor Sanghee Oh Background constraints. Group 3 worked within set background constraints which may or may not apply to other

More information

This guide provides instructions in the installation and configuration of XrayVision DCV.

This guide provides instructions in the installation and configuration of XrayVision DCV. Apteryx Inc. 313 S. High St. Suite 200 Akron, OH 44308 330-376-0889 voice 330-376-0788 fax sales@apteryx.com www.apteryx.com XrayVision DICOM Capture View (DCV) Installation Guide Abstract Abstract Abstract

More information

Answer: D. Answer: B. Answer: B

Answer: D. Answer: B. Answer: B 1. Management information systems (MIS) A. create and share documents that support day-today office activities C. capture and reproduce the knowledge of an expert problem solver B. process business transactions

More information

Design of Infrastructure for NCR Counterpoint

Design of Infrastructure for NCR Counterpoint Design of Infrastructure for NCR Counterpoint The purpose of this document is to assist in determining the correct type of implementation, help implementation teams make critical decisions buying or building

More information

ERP/CRM System Implementation Methodology

ERP/CRM System Implementation Methodology ERP/CRM System Implementation Methodology Prepared by Admiral Consulting Group Date Submitted May 27, 2016 TABLE OF CONTENTS Implementation Methodology... 3 1.1. Analysis (Solution Envisioning) Phase...

More information

1.0. Quest Enterprise Reporter Discovery Manager USER GUIDE

1.0. Quest Enterprise Reporter Discovery Manager USER GUIDE 1.0 Quest Enterprise Reporter Discovery Manager USER GUIDE 2012 Quest Software. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Foundation Learning as a progression route to. Apprenticeships. The Toolkit

Foundation Learning as a progression route to. Apprenticeships. The Toolkit Foundation Learning as a progression route to Apprenticeships The Toolkit Introduction Although Middlesbrough has a higher than average take up on Apprenticeship programmes, a significant number of 16

More information

User Manual. Comarch BI Point. Version:

User Manual. Comarch BI Point. Version: User Manual Comarch BI Point Version: 6.1.0.0 Copyright 2017 COMARCH All rights reserved Unauthorized distribution of the whole or part of this publication in any form is prohibited. Making any copy by

More information

6. Under which of the following categories is a laptop computer classified? (1) Microcomputer (2) Minicomputer (3) Mainframe (4) Supercomputer

6. Under which of the following categories is a laptop computer classified? (1) Microcomputer (2) Minicomputer (3) Mainframe (4) Supercomputer General Certificate of Education (Ord.Level) Examination 2007 Information & Communication Technology I One hour Note: Answer all questions. In each of the questions 1 to 40 pick one of the alternatives

More information

SEPA diary Heuristic evaluation

SEPA diary Heuristic evaluation T-76.4115 Software Project Heuristic evaluation Jon Korgell, 61029B & Niklas Roitto, 58546J RAY/Valimo Electronic Payment System MVJ Valvomo Team CashFlow 4 Dec 2005 Revision 3 1/6 24 Nov 2005 (Revision

More information